stealthy
stealthy copied to clipboard
Ack on application layer
Currently the ack is not protected. It could be dropped or faked by an attacker. Thus, we need an ack on application layer which is cryptographically protected.